Sophos UTM integrates complete security software within a single appliance. And deploy it on the platform that best fits your business: software, hardware or virtual appliance. Each offers an identical feature set no matter if you protect users. And the easy web-based management console enables easy, consolidated management of all your IT security.

Technical Specifications

Specifications are provided by the manufacturer. Refer to the manufacturer for an explanation
of the print speed and other ratings.

Rated 4 out of 5 by Anthony Fernandes We do not have misuse of bandwidth and the firewall and anti-spam filter work great for me. Valuable Features:Most valuable feature I am using I would say is the bandwidth management for users. I have users who misuse the net and I have given them caps so it is properly utilized. Another feature I use is the VPN. I have an entity that requires 24x7x365 connectivity and the Cyberoam is very simple when it comes to monitoring that or refreshing that connection.Improvements to My Organization:A simple example would be the bandwidth usage. We do not have misuse of bandwidth and the firewall and anti-spam filter work great for me. I see a lot of dos attacks that are stopped which is also a plus point. So organizations productivity is higher thanks to the Cyberoam as users are restricted from unnecessary websites and bandwidth is capped and company functions do not suffer.Room for Improvement:Not many things would need to be added but I strongly feel it could be made more robust. For example, the cooling system in the device could do with a good revamp. There are times when the device gets too hot and begins to misbehave. Other things that could be improved are the password complexity policy and the password history policy. One thing that could be done as well is to create role based users like we have in the active directory. There are times when we have users who are not admins but need to monitor the device and access levels do not exist for such users.Technical Support:We don't contact Sophos directly. It is usually through a local partner/vendor.Other Advice:I would recommend for others to go and view the demo. Make sure this device will suit you needs especially in terms of expansion. Also look into support as not many times support is available. It is a simple to understand product but does require some skill to manage and maintain the device for optimal usage.Disclaimer: I am a real user, and this review is based on my own experience and opinions. April 21, 2016

Rated 4 out of 5 by Rodrigo Xavier We can block malicious and unproductive application and sites to improve productivity. Valuable Features:* NG Firewall* Application Filter* Web Filter* IPSAll these features are valuable to us because we can block malicious and unproductive application and sites to improve productivity and security in our network, audit users and machines and protect us against exploitation.Improvements to My Organization:It's improved productivity as well as user and network security.. It's helped with internet access management and provides security against external attacks.Room for Improvement:We have had issues with malicious sites and external scans.Deployment Issues:We didn't have any issues with deployment.Stability Issues:We haven't had issues with stability.Scalability Issues:We haven't had issues with scalability.Other Advice:You should hire a Cyberoam specialist to manage it.Disclaimer: I am a real user, and this review is based on my own experience and opinions. March 30, 2016

Rated 4 out of 5 by Jonathan Prentice Virtual Cyberoam allows the customer granular controls at their level and then allows us overriding controls at a parental level. Valuable Features:Cyberoam is our low-end product that we use for smaller customers or ones where application security is not a priority. Cyberoam has good AD integration for user configuration and web controls which we like a lot and it’s easy to manage and maintain. We mostly use the virtual models in VMware.Improvements to My Organization:The virtual cyberoam has allowed us to segment our cloud customers via a virtual firewall instance per customer as a second level of security behind our primary systems firewalls. This allows the customer granular controls at their level and then allows us overriding controls at a parental level. Makes for great security.Room for Improvement:You can now load the Sophos software onto a Cyberoam box to use the new feature set, although it would be nice if it came with it.Sophos bought Cyberoam a short while ago and they have amalgamated the Sophos technologies with the existing Sophos ones and some from astaro which they previously bought.. So there is now a Sophos firmware which you can install onto the Cyberoam instead of the Cyberoam one. Because it’s Linux based it’s very portable.Other Solutions Considered:Great product for the price.Other Advice:Cyberoam was bought by Sophos and the new Sophos firewalls take the next step adding more functionality and capability in the box. Cyberoam was bought by Sophos and the new Sophos firewalls take the next step adding more functionality and capability in the box.Disclaimer: My company has a business relationship with this vendor other than being a customer:We are a Gold Partner with Cyberoam. March 29, 2016

Rated 2 out of 5 by Anil Jha It has good bandwidth management, although licensing costs are high. Valuable Features:* Management Console* Security* Bandwidth managementUse of Solution:I've used it for six years.Deployment Issues:Yes once when we updated a new firmware, then we again rolled back to previous one.Customer Service:Customer service is very poor.Technical Support:They have good technical support.Initial Setup:When we purchased it, it was complex, but now it’s straightforward. The SSO is introduced in our premise only. At that time we only had the requirement of SSO.Implementation Team:The first time through the vendor, and the second time our own in house team did it.Cost and Licensing Advice:Pricing and licensing is high.Disclaimer: I am a real user, and this review is based on my own experience and opinions. February 17, 2016

Rated 4 out of 5 by Farzad Ghafourian It has good performance but their quality control needs to be improved. Valuable Features:* Web filtering* Application filtering* IPS* QoSImprovements to My Organization:I used to work for a Cyberoam distributor. In one of my projects, I deployed it in a university with 1500 users (students), all of whom had different QoS and web category policies, different authentication policies. I then had to connect the university’s branches, in different cities, with a Site to Site VPN using AD authentication available for just the account. This was to restrict access only to the accounting application server of the other branch. It was quite complicated to do, but it was very successful.In another project for a bank, I secured a banking application server and attached a database using two Cyberoam devices on the edge, with a Juniper device in the middle. This was for securing three different segments - internal users, internal developers and external visitors. The final topology was so secure that, even for some testing purposes, we were not able to break in to change the configuration and access the system as a third party.Room for Improvement:Not very often, but there are some minor bugs in the products. I think their quality control can improve.Use of Solution:I’ve used it since 2008, so seven years so far.It is a complex product so I’d rate the performance and number of features as 10/10, and 7/10 for the consistency and programing.Deployment Issues:Generally speaking, the Cyberoam development is quite simple, easy and straight forward. Overall it depends on the network complexity.Stability Issues:Compared to a Cisco router, Cyberoam UTMs need to be restarted more often. From my point of view, this is acceptable, since many aspects of the product functions in layer seven, while a Cisco router just routes!Scalability Issues:Since all the products models from the smallest to the strongest have the same features and capabilities, I can say that the product is extremely scalable. However, if you need to upgrade the whole device to a stronger model, I would say scalability is 8/10, which considering the differences between the number of ports in different models (I could even give 9/10, but let’s stay with 8/10!).Customer Service:It really depends on the retailer, representative and local distributor. Nothing much to say.Technical Support:One of the most considerable advantages of Cyberoam over the competitors is the after sales support. The 24/7 support assists the customers, even from minor to very major issues, and they chase up the issue until the final resolution by email and phone. They are really trustworthy.Previous Solutions:In a different continent, a different company, and as a customer (not a distributor) I still used the same brand, Cyberoam! It’s cheap, flexible, easy to configure and easy to manage.Initial Setup:I’ve been using the product for ages and I have deployed it in hundreds of networks and complexities. However, using the configuration wizard, the initial configuration is extremely easy and straightforward (depending on the network complexity of course).Implementation Team:I have always installed it myself.Cost and Licensing Advice:It's hard to estimate, as it depends on the complexity, and scale of the network.It takes anywhere from one day to less than a week in normal situations.Other Solutions Considered:I have evaluated Juniper, WatchGuard and a couple of minor brands. So far, I can still raise the flag of Cyberoam.Other Advice:Since the features on the model are the same, and it is just the hardware that gets improved for higher models, I usually advise a model one and a half times bigger than the number of the network users. For instance a 1000 user network can be easily served by a 1500NG. However based on my experience, since not all the users are active simultaneously, even 1 to 1 is sufficient. Considering the capability of HA, expansion is simple if needed.Disclaimer: I am a real user, and this review is based on my own experience and opinions. September 30, 2015

Rated 3 out of 5 by Alok Dixit It's good, yet it needs a few improvements. Valuable Features:* Firewall rules* Full control on access management* It's simpleRoom for Improvement:The scalability needs work.Use of Solution:I've used it for four years.Deployment Issues:No issues encountered.Stability Issues:No issues encountered.Scalability Issues:It needs improvement.Customer Service:8/10.Technical Support:8/10.Previous Solutions:We used Cisco, but it was complicated and expensive so we switched.Implementation Team:We used a vendor to do the implementation, and they were 8/10.Other Solutions Considered:CiscoDisclaimer: I am a real user, and this review is based on my own experience and opinions. June 15, 2015

Rated 4 out of 5 by Charles Nana It is very good and very near perfect. Valuable Features:The UTM features. It’s a one stop IT security solution managed from the Cyberoam Central Console (CCC).Improvements to My Organization:Dealing with security threats is a lot easier as it’s less of a CLI interface, and more of a GUI.Use of Solution:I’ve used it for 12 months.Deployment Issues:I met the whole system working when I resumed duty as a Network Security Support Engineer 12 months ago.Stability Issues:Since I resumed my post, the entire Cyberoam system has been stable.Scalability Issues:Since I resumed my post, the entire Cyberoam system has been stable.Customer Service:8/10.Technical Support:8/10.Initial Setup:I met an already functional system when I resumed my present appointment.Implementation Team:I was made to understand that implementation was an in-house arrangement.ROI:* Cost effectiveness* Easier to manage* Turnaround time in getting issues resolved fasterOther Advice:The product is very good and very near perfect in terms of service delivery, cost effectiveness and manageability.Disclaimer: I am a real user, and this review is based on my own experience and opinions. June 15, 2015